■■■■□ Data-Leak | Security update: Incident related to Red Hat Consulting GitLab instance. https://www.redhat.com/en/blog/security-update-incident-related-red-hat-consulting-gitlab-instance
All posts by John Doe
October 3, 2025 at 02:24AM
🔑 OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely. ➿CVE-2025-9230: Memory Corruption Vulnerability ➿CVE-2025-9231: Timing Side-Channel Flaw OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
October 2, 2025 at 01:00PM
■■■□□ 📡 Cisco Meraki interactive auditing tool in python. 〰️Installs its own dependencies. 〰️Tool does read-only API check. 〰️Dumps the config in JSON (missing natively in Meraki Dashboard) 〰️Has option to select Network or dump-all 〰️Performs security audit and saves in csv And saves as: meraki/ └── NetworkName/ ├── config.json # Complete configuration dump └──…
October 1, 2025 at 07:30PM
■□□□□ Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability. Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability
October 1, 2025 at 02:53PM
■■□□□ Dubai Police launched a Dh 223,000 cybersecurity contest to attract ethical hackers. Registration opens on October 1, with online qualifiers running from October 5 until the end of the month. https://www.khaleejtimes.com/uae/dubai-police-launch-cybersecurity-competition
October 1, 2025 at 09:39AM
■■■■□ GhostSocks: From Initial Access to Residential Proxy. https://synthient.com/blog/ghostsocks-from-initial-access-to-residential-proxy
September 30, 2025 at 09:09PM
■■■□□ CVE-2025-32463: Another critical EoP in sudo has been discovered. https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-linux-sudo-flaw-exploited-in-attacks/
September 30, 2025 at 03:11PM
■■□□□ Ransomware group sought BBC reporter’s help in hacking media giant. https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-reporters-help-in-hacking-media-giant/
September 30, 2025 at 10:18AM
■■□□□ Hackers Can Bypass EDR by Downloading a Malicious File as an In-Memory PE Loader. Hackers Can Bypass EDR by Downloading a Malicious File as an In-Memory PE Loader
September 29, 2025 at 07:18PM
■■■■□ Zero-Day: DefCon lock picking.
